CVE-2025-48038: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
AI Analysis
Technical Summary
CVE-2025-48038 is a medium-severity vulnerability affecting the Erlang Open Telecom Platform (OTP) specifically within its SSH implementation, notably the ssh_sftp modules. The vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption). It arises from the ssh_sftpd.erl source file, where resource allocation is not properly limited or throttled, allowing an attacker to trigger excessive resource consumption. This can lead to resource leaks and potentially degrade the availability of the affected system. The vulnerability impacts OTP versions from 17.0 through 28.0.3, including specific patch versions 27.3.4.3 and 26.2.5.15, and ssh package versions from 3.0.1 through 5.3.3 and their respective minor updates. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), no privileges (PR:L) but some level of privilege is needed (PR:L indicates low privileges), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but with a low impact on availability (VA:L). No known exploits are currently reported in the wild. The vulnerability could be exploited remotely to cause denial of service conditions by exhausting system resources through the SSH SFTP service, potentially leading to service degradation or crash. This is particularly relevant for systems relying on Erlang OTP for SSH services, including telecom infrastructure, messaging systems, and distributed applications that use Erlang's SSH capabilities.
Potential Impact
For European organizations, the impact of CVE-2025-48038 can be significant, especially for those relying on Erlang OTP in critical infrastructure, telecommunications, or backend services that utilize SSH and SFTP for secure file transfers and remote management. An attacker exploiting this vulnerability could cause denial of service by exhausting server resources, leading to service outages or degraded performance. This could disrupt business operations, impact customer-facing services, and potentially cause cascading failures in distributed systems. Given Erlang's widespread use in telecom and messaging platforms, service providers and enterprises in Europe could face operational risks. Additionally, organizations with strict uptime and availability requirements, such as financial institutions and healthcare providers, may experience compliance and reputational damage if services are interrupted. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone can have severe operational consequences.
Mitigation Recommendations
To mitigate CVE-2025-48038, European organizations should: 1) Immediately identify and inventory all systems running affected Erlang OTP versions, particularly those exposing SSH/SFTP services. 2) Apply vendor patches or updates as soon as they become available; if patches are not yet released, consider upgrading to unaffected OTP versions beyond 28.0.3 or the latest stable release. 3) Implement network-level controls such as rate limiting and connection throttling on SSH/SFTP services to prevent excessive resource consumption from a single source. 4) Monitor SSH/SFTP service logs and system resource usage for unusual spikes indicative of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect abnormal SSH/SFTP traffic patterns. 6) Segment critical Erlang-based services behind firewalls and restrict access to trusted networks or VPNs to reduce exposure. 7) Conduct regular security assessments and stress testing to validate the resilience of SSH services against resource exhaustion attacks. These steps go beyond generic advice by focusing on proactive detection, network-level controls, and prioritizing patch management specific to Erlang OTP environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Italy, Spain, Poland
CVE-2025-48038: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
Description
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-48038 is a medium-severity vulnerability affecting the Erlang Open Telecom Platform (OTP) specifically within its SSH implementation, notably the ssh_sftp modules. The vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption). It arises from the ssh_sftpd.erl source file, where resource allocation is not properly limited or throttled, allowing an attacker to trigger excessive resource consumption. This can lead to resource leaks and potentially degrade the availability of the affected system. The vulnerability impacts OTP versions from 17.0 through 28.0.3, including specific patch versions 27.3.4.3 and 26.2.5.15, and ssh package versions from 3.0.1 through 5.3.3 and their respective minor updates. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), no privileges (PR:L) but some level of privilege is needed (PR:L indicates low privileges), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but with a low impact on availability (VA:L). No known exploits are currently reported in the wild. The vulnerability could be exploited remotely to cause denial of service conditions by exhausting system resources through the SSH SFTP service, potentially leading to service degradation or crash. This is particularly relevant for systems relying on Erlang OTP for SSH services, including telecom infrastructure, messaging systems, and distributed applications that use Erlang's SSH capabilities.
Potential Impact
For European organizations, the impact of CVE-2025-48038 can be significant, especially for those relying on Erlang OTP in critical infrastructure, telecommunications, or backend services that utilize SSH and SFTP for secure file transfers and remote management. An attacker exploiting this vulnerability could cause denial of service by exhausting server resources, leading to service outages or degraded performance. This could disrupt business operations, impact customer-facing services, and potentially cause cascading failures in distributed systems. Given Erlang's widespread use in telecom and messaging platforms, service providers and enterprises in Europe could face operational risks. Additionally, organizations with strict uptime and availability requirements, such as financial institutions and healthcare providers, may experience compliance and reputational damage if services are interrupted. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone can have severe operational consequences.
Mitigation Recommendations
To mitigate CVE-2025-48038, European organizations should: 1) Immediately identify and inventory all systems running affected Erlang OTP versions, particularly those exposing SSH/SFTP services. 2) Apply vendor patches or updates as soon as they become available; if patches are not yet released, consider upgrading to unaffected OTP versions beyond 28.0.3 or the latest stable release. 3) Implement network-level controls such as rate limiting and connection throttling on SSH/SFTP services to prevent excessive resource consumption from a single source. 4) Monitor SSH/SFTP service logs and system resource usage for unusual spikes indicative of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect abnormal SSH/SFTP traffic patterns. 6) Segment critical Erlang-based services behind firewalls and restrict access to trusted networks or VPNs to reduce exposure. 7) Conduct regular security assessments and stress testing to validate the resilience of SSH services against resource exhaustion attacks. These steps go beyond generic advice by focusing on proactive detection, network-level controls, and prioritizing patch management specific to Erlang OTP environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- EEF
- Date Reserved
- 2025-05-15T08:36:04.576Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c31dfb563d4c3db05f6e45
Added to database: 9/11/2025, 7:07:39 PM
Last enriched: 9/19/2025, 1:04:26 AM
Last updated: 10/29/2025, 9:13:44 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Dentsu Subsidiary Breached, Employee Data Stolen
MediumCVE-2025-9871: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Razer Synapse 3
HighCVE-2025-9870: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Razer Synapse 3
HighCVE-2025-11465: CWE-416: Use After Free in Ashlar-Vellum Cobalt
HighCVE-2025-11464: CWE-122: Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.